Lecture 9 Outline

Reading: text, §23 (except 23.6); [Nac97]
Due: Homework 3, on May 9


  1. Greetings and felicitations!
    1. Midterm is Tuesday, May 2, in class
    2. Homework 3 is available and is due in 2 weeks, on May 9.
    3. I am cancelling my Wednesday 9am office hour; instead, I will hold one at 4:10pm today.
  2. Puzzle of the Day
  3. Types of malicious logic
    1. Quick review: Trojan horse
    2. Computer virus
      1. Boot sector infector
      2. Executable infector
      3. Multipartite
      4. TSR (terminate and stay resident)
      5. Stealth
      6. Encrypted
      7. Polymorphic
      8. Metamorphic
      9. Macro
    3. Computer worm
    4. Bacterium, rabbit
    5. Logic bomb
    6. Keystroke logger
    7. Ransomware
    8. Botnets

Discussion question. What do you think of the following homework assignment?

The Task
Student is to perform a remote security evaluation of one or more computer systems. The evaluation should be conducted over the Internet, using tools available in the public domain.

What the student must submit
In conducting this work, you should imagine yourself to be a security contracted by the owner of the computer system(s) to perform a security evaluation.
The student must provide a written report which has the following sections: Executive summary, description of tools and techniques used, dates and times of investigations, examples of data collected, evaluation data, overall evaluation of the system(s) including vulnerabilities.

Important note: This is not an assignment for this class. I am only asking what you think of it. The assignment is reported on the web at http://isc.sans.org/diary.php?storyid=1155.


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of April 25, 2016 at 11:12PM

You can also obtain a PDF version of this.